Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Leeds

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.220.35.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17132
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.220.35.104.			IN	A

;; AUTHORITY SECTION:
.			395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112802 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 29 04:21:34 CST 2019
;; MSG SIZE  rcvd: 116
Host info
104.35.220.2.in-addr.arpa domain name pointer 02dc2368.bb.sky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.35.220.2.in-addr.arpa	name = 02dc2368.bb.sky.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.246.44.135 attackbots
2019-12-18T14:06:03.541Z CLOSE host=46.246.44.135 port=55472 fd=4 time=20.020 bytes=11
...
2020-03-13 03:48:43
47.104.236.93 attack
2020-01-12T08:04:43.341Z CLOSE host=47.104.236.93 port=41225 fd=4 time=20.020 bytes=26
...
2020-03-13 03:45:20
49.204.14.162 attack
2020-03-10T11:14:37.262Z CLOSE host=49.204.14.162 port=58577 fd=4 time=20.012 bytes=17
...
2020-03-13 03:35:31
193.112.191.228 attackbotsspam
Mar 12 13:23:13 vps58358 sshd\[15571\]: Invalid user pat from 193.112.191.228Mar 12 13:23:14 vps58358 sshd\[15571\]: Failed password for invalid user pat from 193.112.191.228 port 45490 ssh2Mar 12 13:24:34 vps58358 sshd\[15580\]: Failed password for root from 193.112.191.228 port 32768 ssh2Mar 12 13:27:12 vps58358 sshd\[15620\]: Invalid user Ronald from 193.112.191.228Mar 12 13:27:14 vps58358 sshd\[15620\]: Failed password for invalid user Ronald from 193.112.191.228 port 35548 ssh2Mar 12 13:28:33 vps58358 sshd\[15633\]: Failed password for root from 193.112.191.228 port 51054 ssh2
...
2020-03-13 03:51:22
45.83.66.197 attackspambots
2019-12-11T15:58:43.337Z CLOSE host=45.83.66.197 port=12790 fd=4 time=20.020 bytes=25
...
2020-03-13 03:57:25
47.106.136.178 attackbotsspam
2020-01-28T13:45:44.765Z CLOSE host=47.106.136.178 port=49160 fd=4 time=20.011 bytes=15
...
2020-03-13 03:44:18
49.151.24.132 attackbots
2019-10-31T11:58:54.404Z CLOSE host=49.151.24.132 port=53616 fd=4 time=20.011 bytes=23
...
2020-03-13 03:35:47
139.59.61.186 attackspambots
IP blocked
2020-03-13 04:03:50
47.30.206.234 attackspam
2020-02-01T12:51:54.313Z CLOSE host=47.30.206.234 port=59045 fd=4 time=40.029 bytes=56
...
2020-03-13 03:41:05
1.255.217.189 attack
Scan detected 2020.03.12 13:28:29 blocked until 2020.04.06 10:59:52
2020-03-13 03:58:56
45.232.164.53 attackspambots
2019-12-27T13:48:40.627Z CLOSE host=45.232.164.53 port=50980 fd=4 time=20.021 bytes=16
...
2020-03-13 04:04:45
159.89.201.59 attackbots
Mar 12 17:51:26 meumeu sshd[18987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.59 
Mar 12 17:51:27 meumeu sshd[18987]: Failed password for invalid user ll from 159.89.201.59 port 60152 ssh2
Mar 12 17:52:34 meumeu sshd[19154]: Failed password for root from 159.89.201.59 port 49178 ssh2
...
2020-03-13 03:59:19
45.83.66.207 attackspambots
2020-01-10T21:05:20.012Z CLOSE host=45.83.66.207 port=49352 fd=4 time=20.017 bytes=26
...
2020-03-13 03:57:08
80.211.225.143 attack
Mar 12 14:41:17 Tower sshd[31266]: Connection from 80.211.225.143 port 43722 on 192.168.10.220 port 22 rdomain ""
Mar 12 14:41:19 Tower sshd[31266]: Invalid user ts3 from 80.211.225.143 port 43722
Mar 12 14:41:19 Tower sshd[31266]: error: Could not get shadow information for NOUSER
Mar 12 14:41:19 Tower sshd[31266]: Failed password for invalid user ts3 from 80.211.225.143 port 43722 ssh2
Mar 12 14:41:19 Tower sshd[31266]: Received disconnect from 80.211.225.143 port 43722:11: Bye Bye [preauth]
Mar 12 14:41:19 Tower sshd[31266]: Disconnected from invalid user ts3 80.211.225.143 port 43722 [preauth]
2020-03-13 03:54:10
117.52.87.230 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-13 03:53:48

Recently Reported IPs

211.19.103.162 139.30.102.226 108.144.182.2 142.162.57.131
144.137.210.114 70.149.71.195 52.215.208.37 189.32.219.64
168.176.164.5 183.111.169.133 151.127.55.49 99.61.16.232
58.142.238.108 171.236.111.53 203.205.253.240 214.100.127.130
83.73.198.244 193.199.108.196 35.254.250.166 56.80.58.171